Jing Zhou
Huanggang Normal University, Huanggang, 438000, Hubei, China
Yu-Rong Guan
Huanggang Normal University, Huanggang, 438000, Hubei, China
ABSTRACT
This study tells the story of in order to effectively resist the invasion of external .NET platform system, improve system security, it must establish the prevention and monitoring technologies improve system security system. System programmer and administrators only in the system design stage, to do a safety prevention programs and solutions to security applications; finally put forward the platform system safety prevention programme. in addition, this study analyzes the study of the .NET application process, three elements of security (authentication, authorization, fake) their own characteristics; Secondly, in detail .NET environment based on common security vulnerabilities and security architecture .NET environment; Finally, the study of the IIS and .NET authentication mode application and authorization mechanisms and their intranet and internet environment to achieve the security policy configuration and design.
PDF References Citation
How to cite this article
Jing Zhou and Yu-Rong Guan, 2013. Research and Design of System Security Strategy Based on NET Platform. Information Technology Journal, 12: 5097-5101.
DOI: 10.3923/itj.2013.5097.5101
URL: https://scialert.net/abstract/?doi=itj.2013.5097.5101
DOI: 10.3923/itj.2013.5097.5101
URL: https://scialert.net/abstract/?doi=itj.2013.5097.5101
REFERENCES
- Zhou, J., 2010. The analysis of XML technology in network security. Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing, November 1-4, 2009, Washington, DC., USA., pp: 701-704.
CrossRef - Zhou, J., 2012. The analysis of the safety defects based on ASP.NET. Proceedings of the International Conference on ICCIC, Vol. 231, September 17-18, 2011, Wuhan, China, pp: 71-75.
CrossRef - Zhou, J. and Y. Fang, 2009. The component code of each call analyze and compare based on. NET. Proceedings of the 3rd International Symposium on Intelligent Information Technology Application, November 21-22, 2009, Nanchang, pp: 689-691.
CrossRef - Zhou, J. and Y. Fang, 2009. The examinational technology of invasion analysis based on network security. Proceedings of the International Conference on Control, Automation and Systems Engineering, July 11-12, 2009, Zhangjiajie, pp: 624-627.
CrossRef